Results 41 to 50 of about 6,690 (268)
Secrecy Rate Region Enhancement in Multiple Access Wiretap Channel
It is commonly known that physical layer security is achieved with a trade-off in terms of the achievable rate. Hence, security constraints generate rate losses in wiretap channels.
Shahid Mehraj Shah
doaj +1 more source
On the Binary Input Gaussian Wiretap Channel with/without Output Quantization
In this paper, we investigate the effect of output quantization on the secrecy capacity of the binary-input Gaussian wiretap channel. As a result, a closed-form expression with infinite summation terms of the secrecy capacity of the binary-input Gaussian
Chao Qi, Yanling Chen, A. J. Han Vinck
doaj +1 more source
A Model for Adversarial Wiretap Channels
In wiretap model of secure communication the goal is to provide (asymptotic) perfect secrecy and reliable communication over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key.
Wang, Pengwei, Safavi-Naini, Reihaneh
openaire +2 more sources
The Wiretapped Diamond-Relay Channel [PDF]
30 pages, 4 figures, Submitted to IEEE Transactions on Information ...
Si-Hyeon Lee, Ashish Khisti
openaire +3 more sources
The article presents an analysis of the physical layer security of a wireless communication system functioning in the presence of multipath fading and a wiretap.
Aleksey S. Gvozdarev +1 more
doaj +1 more source
Optimization of Code Rates in SISOME Wiretap Channels
We propose a new framework for determining the wiretap code rates of single-input single-output multi-antenna eavesdropper (SISOME) wiretap channels when the capacity of the eavesdropper's channel is not available at the transmitter.
Geraci, Giovanni +4 more
core +1 more source
Semantically Secure Lattice Codes for Compound MIMO Channels [PDF]
We consider compound multi-input multi-output (MIMO) wiretap channels where minimal channel state information at the transmitter (CSIT) is assumed.
Belfiore, Jean-Claude +2 more
core +2 more sources
Polar Coding for Confidential Broadcasting
A polar coding scheme is proposed for the Wiretap Broadcast Channel with two legitimate receivers and one eavesdropper. We consider a model in which the transmitter wishes to send the same private (non-confidential) message and the same confidential ...
Jaume del Olmo Alòs +1 more
doaj +1 more source
Exact Random Coding Secrecy Exponents for the Wiretap Channel
We analyze the exact exponential decay rate of the expected amount of information leaked to the wiretapper in Wyner's wiretap channel setting using wiretap channel codes constructed from both i.i.d. and constant-composition random codes. Our analysis for
Merhav, Neri +2 more
core +1 more source
A New Physical Layer Security Scheme Based on Adaptive Bit Channel Selection for Polar-Coded OFDM
We propose a new physical layer security scheme for a wiretap channel in polar-coded OFDM-based wireless communication systems. Our approach is based on the adaptive bit channel selection, where the input bit channels of polar code are selected according
Yuki Kuraya, Hideki Ochiai
doaj +1 more source

